Skip to content

Doug Hurd Manager of Cisco Secure Technical Alliance discusses how to eliminate five common problems in security deployments.

  1. Maintain tools without taking down the network – as it is never a good time to take the network down a visibility fabric allows you to architect the network to avoid this
  2. Avoid blocking legitimate traffic.
  3. Filter out unneeded traffic saving time and money – Filtering traffic upstream of the appliance optimizes cost.
  4. Optimize the number and speed of ports.
    1. Too many network links to monitor and not enough ports
    2. Tool and network speed mismatches
  5. Decrypt SSL traffic externally to save money and share multiple tools

Listen to his talk here:

Related Posts

Understanding Network Impairment Emulation: Building Resilient and High-Performance Networks

Understanding Network Impairment Emulation: Building Resilient and High-Performance Networks

Modern networks are more complex than ever — spanning cloud, edge, and on-prem environments with applications that depend on consistent,…
Case Study: Leading Canadian University Modernizes Campus Operations with Modern Clock System from Sapling & Telnet Networks

Case Study: Leading Canadian University Modernizes Campus Operations with Modern Clock System from Sapling & Telnet Networks

The Situation In 2018, a major Ontario university partnered with Telnet Networks to overhaul its campus-wide synchronized clock system. The…
Fall Product Update 2025

Fall Product Update 2025

As the seasons change, so do the demands on your network. Our Fall Product Update showcases new and updated products…
The Advantages of IP & PoE Clocks

The Advantages of IP & PoE Clocks

Accurate time isn’t just a convenience – it is a critical factor in maintaining compliance, productivity, and safety across modern…
Bypass Switches: Ensuring Network Uptime and Security in High-Stakes Environments

Bypass Switches: Ensuring Network Uptime and Security in High-Stakes Environments

Modern Bypass Switches also offer granular control and flexible configurations, allowing administrators to choose whether the device should fail open…